Snyk and Legit Security are competing products in the cybersecurity space. Despite Snyk's robust pricing and effective support services, Legit Security presents superior features, giving it an upper hand in providing end-to-end protection and advanced security capabilities.
Features: Snyk offers strong integration capabilities with a comprehensive vulnerability scanning feature that excels in open-source security and provides actionable remediation advice. It is developer-friendly with integrations into continuous integration pipelines and offers reliable container security features. Legit Security extends its scope by securing development pipelines, protecting against software supply chain threats, and offering a comprehensive unified application security control panel. Its integration with existing tools and focus on end-to-end security makes it a robust choice.
Room for Improvement: Snyk could enhance its feature set by providing more comprehensive licensing checks and improving its on-premise setup cost. Further development in reducing on-premise environmental integration costs could be beneficial. Legit Security may need to improve secret detection to reduce false positives and streamline manual intervention. It could also offer more refinement in its secret management and validation features to better support its capabilities.
Ease of Deployment and Customer Service: Snyk has a user-friendly integration model that results in quick deployment supported by a proactive customer service team. It enables developers to own security with ease, offering comprehensive documentation to facilitate smooth onboarding. Legit Security, though requiring a more complex initial setup, provides reliable customer support that helps in easing deployment. The integration process is versatile, supporting effective communication during and after deployment, adding significant value.
Pricing and ROI: Snyk offers competitive pricing with a strong ROI for companies focused on open-source security, presenting itself as a cost-effective option. Although Legit Security requires a higher initial investment, it provides significant ROI due to its extensive features covering broader security needs. While Snyk attracts budget-conscious buyers, Legit Security validates its value through extensive security offerings and long-term benefits.
| Product | Mindshare (%) |
|---|---|
| Snyk | 16.5% |
| Cortex Cloud by Palo Alto Networks | 1.8% |
| Legit Security | 3.0% |
| Other | 78.7% |


| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 9 |
| Large Enterprise | 22 |
Cortex Cloud by Palo Alto Networks enhances cloud security with features like AI/ML threat detection and automated remediation, ensuring real-time protection and efficient management across cloud environments.
Cortex Cloud by Palo Alto Networks offers comprehensive cloud security posture management and runtime protection. It reduces manual tasks and accelerates incident investigation through advanced threat detection and AI-driven anomaly detection. With integration to the MITRE ATT&CK framework, it boosts threat response while reducing incident resolution time. Although users find the UI complex and pricing high, its capabilities in securing AWS, Azure, and other environments, as well as its potential integration with CyberArk, emphasize its enterprise-ready design for cloud transformation across diverse industry sectors.
What are the key features of Cortex Cloud by Palo Alto Networks?Cortex Cloud by Palo Alto Networks is deployed across industries like telecom, BFSI, and manufacturing for robust cloud security. It's leveraged for detecting misconfigurations and vulnerabilities, aiding cloud transformation and compliance with standards such as GDPR and NIST. The integration across cloud infrastructures, including AWS and Azure, supports policy creation and threat management strategies for diverse enterprises.
Legit Security provides application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attack. The platform’s unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.
Snyk excels in integrating security within the development lifecycle, providing teams with an AI Trust Platform that combines speed with security efficiency, ensuring robust AI application development.
Snyk empowers developers with AI-ready engines offering broad coverage, accuracy, and speed essential for modern development. With AI-powered visibility and security, Snyk allows proactive threat prevention and swift threat remediation. The platform supports shifts toward LLM engineering and AI code analysis, enhancing security and development productivity. Snyk collaborates with GenAI coding assistants for improved productivity and AI application threat management. Platform extensibility supports evolving standards with API access and native integrations, ensuring comprehensive and seamless security embedding in development tools.
What are Snyk's standout features?
What benefits can users expect?
Industries leverage Snyk for security in CI/CD pipelines by automating checks for dependency vulnerabilities and managing open-source licenses. Its Docker and Kubernetes scanning capabilities enhance container security, supporting a proactive security approach. Integrations with platforms like GitHub and Azure DevOps optimize implementation across diverse software environments.
We monitor all Application Security Posture Management (ASPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.